If you go into your settings in Windows 10 and select Apps you should see the above dialog.
You can see the options that are available to you as shown above. You’ll see that one of the options available is Allow apps from Store only. Although not a fool-proof security option but setting this would reduce the chances of malware executing on the desktop because the only method of installation is from the Microsoft curated Store. A random piece of malware, delivered via email say, could not execute since it doesn’t come from the Microsoft Store I would suggest.
Using Intune we can apply this setting across a range of Windows 10 desktops using a Windows 10 Device Restriction Policy as you see above. Simply locate the App Store option, then Apps from store only and set the value to Require as shown.
In a short period of time, once the policy has deployed, those devices will only be able to install software from the Microsoft Store, preventing installation from anywhere else and hopefully also preventing malware installations.
The good thing about this restriction is the user can still be a local administrator of their machine if you desire and installations will be restricted. The other good things is that it is policy based, which means it is easy to turn on and off as required or exclude users if need be.
As I said earlier, it is not a fool proof method of preventing malware being installed on a Windows 10 desktop, but would certainly make it much more difficult. In this day and age, we need all the help we can get to counter the threats. Hopefully, this will help.
Every plan in Microsoft 365 and just about every plan in Office 365 includes Microsoft Stream, which is a private video hosting service from Microsoft. Stream is also integrated into Microsoft Teams, so that, if you record a meeting in Teams it is automatically saved in Stream for replay later. You can also transcribe anything spoken in the video to searchable text within Stream.
You may however find that this automatic captioning is not enabled by default in Stream. To see whether it is, simply connect to your tenant via PowerShell and run the command:
get-CsTeamsMeetingPolicy -Identity global
In the results look for the line:
as shown above. If it is set to False, run the command:
Set-CsTeamsMeetingPolicy -Identity Global -AllowTranscription $True
to enable Stream transcription. Note, that it may take a little while for the policy to be applied.
Now, when you upload a video to Stream or record a meeting in Teams any speech should be transcribed for you automatically.
If you update to the latest version of the Microsoft Teams app for iOS you will now find a What’s new option in the settings as shown above. This will provide you information about everything that has been to the current version of the mobile app.
The above from is from the message center of a Microsoft 365 Business tenants confirming that Shared Computer Access (SCA) will very soon to be available in Microsoft 365 Business SKUs. This will allow those SKUs to install Office desktop software on things such as on premises servers with a Remote Desktop Services (RDS) role (aka on a Terminal Server).
To do so previous required an Enterprise (E) license. This is big news for Microsoft 365 Business and further improves the value of this SKU!
By default, you’ll see that most people on Linkedin have a Connect button like shown above. Now that is a great option, however unfortunately, I’m sure many people have connected with someone on Linkedin innocently and almost immediately you get spammed since they can now message you. Of course, you can remove them but there is a better way to reduce this happening.
What you do to change the default option from Connect to Follow is go into your Privacy settings, then select Blocking and hiding. At the bottom enable Make follow primary.
Now the default action will be Follow as seen above. Is Connect still there?
Yes, but you need go hunting for it, which means that most people trying to spam you probably won’t bother doing that.
Not foolproof I admit, but certainly a handy way to make it just that little bit harder to spam you!
One of things that I’m spending a lot of time here at the MVP Summit in Seattle doing is networking with other MVPs. One of the best tools to connect is via Linkedin. Here’s a really simple way to make that happen that I learned about today (and can share) using the Linkedin mobile app.
Fire up the Linkedin App on your mobile device. Here I’ll use iOS. To the right of the search bar you’ll notice four squares arranged together as shown above. Select this.
This should take you to a screen like shown above. Across the top you now have two options, Scan and My code. Scan allows you to use the camera on your device to scan someone else’s Linkedin QR code. My Code display your QR code that you can share with others.
Once you have scanned in the QR code using this method, that person’s Linkedin details will appear on your mobile device and you can connect. Easy eh?
We catch you up with everything in the Microsoft Cloud and then spend some time talking about the new certifications that have just become available from Microsoft for both Microsoft 365 and Azure. I share some of my experiences and thought around doing these exams and their value to all IT Professionals going forward. We’ll be covering more about certifications down the track but this one should get you thinking about which one you should do!
Take a listen and let us know what you think – firstname.lastname@example.org
You can listen directly to this episode at:
Subscribe via iTunes at:
The podcast is also available on Stitcher at:
Don’t forget to give the show a rating as well as send us any feedback or suggestions you may have for the show.
Azure opens datacenters in Africa
Microsoft announces Azure Sentinel
Introducing Microsoft Threat Experts
Get the latest Microsoft Security Intelligence report
Teams V Slack
Connect to Office 365 PowerShell via GUI
A very common need these days is to do an email message trace. This can be done the old way in the Exchange Online Admin center or the new way via Mail Flow in the Security and Compliance center.
You simply enter the details and then run a search.
and the output looks like the above, where you can also drill in and get more detail.
As with all things Office 365, you can achieve the exact same thing using PowerShell as I have shown above. The code to achieve this is quite straight forward but I have uploaded it to my GitHub repo to save you the trouble:
Where PowerShell comes into its own is when you need to a variety of tasks, perhaps an investigation of a breach. Using PowerShell you can easily dump all the information to CSV for further analysis rather than having to root it out in the web interface.